Crusaders of Rust
@cor_ctf
A European and American Collegiate CTF Team
Here is our 0day for kernelCTF🩸 - 82k bounty - quickest submission ever - all instances pwned😎 syst3mfailure.io/rbtree-family-… Disclaimer: We apologize for abusing the red black tree family. Turning grandparents against grandchildren is only acceptable in the context of pwn😤
Exploit write-ups for our 🚨latest 0-day🚨and the tragedy that swept the red black tree family dropping soon 👀 Here is a tiktok style video for those of you with no attention span thanks to slop and social media. Turn on the audio!!!
Exploit write-ups for our 🚨latest 0-day🚨and the tragedy that swept the red black tree family dropping soon 👀 Here is a tiktok style video for those of you with no attention span thanks to slop and social media. Turn on the audio!!!
"Unleashing a 0day: Pivoting Capabilities and Conquering the Linux Kernel" 🕺 💪 by Pedro Guerra de Oliveira Pinto
corCTF 2025 is a little over a month away!🚩 This year, we have a prize pool worth over 10k, with 9k in cash prizes! 💵 As for the first teaser, we are introducing CoRPhone! Are you ready to pwn an Android kernel, exfiltrate chat logs, and save a 1 million dollar pigeon?👀

Oops, we just pwned the kernelCTF mitigation instance with a 0day😳 Our fellow pwner syst3mfailure has picked up pigeon feeding as a hobby to help him cope with the insanity

🚨🚨🚨We just broke everyone’s favorite CTF PoW🚨🚨🚨 Our teammate managed to achieve a 20x SPEEDUP on kctf pow through AVX512 on Zen 5. Full details here: anemato.de/blog/kctf-vdf The Sloth VDF is dead😵 This is why kernelCTF no longer has PoW!
We are the fastest on our keyboard... 0day unleashed and race condition triggered in kernelctf spreadsheet🩸

A great overview of the Linux Page Allocator 💯 syst3mfailure.io/linux-page-all…
We are back😎 Say hello to our kernelCTF submission for CVE-2025-37752🩸 Who would have thought you could pwn a kernel with just a 0x0000 written 262636 bytes out of bounds? Read the full writeup at: syst3mfailure.io/two-bytes-of-m… 👀
Earlier this year, I used a 1day to exploit the kernelCTF VRP LTS instance. I then used the same bug to write a universal exploit that worked against up-to-date mainstream distros for approximately 2 months. osec.io/blog/2024-11-2…
76a62b975b1e12c82bc08343a891d7b138058320504bb38c43a3c6eecc8cb8ec ⛈️
We took third place at DEF CON CTF Finals this year, with @SuperGuesser and @codered_korea! Thanks to @Nautilus_CTF for organizing 🥳
Checkout FizzBuzz101's corCTF 2024 challenge writeups! Leaking Flags from Initramfs with Spectre v1: willsroot.io/2024/08/just-a… KVM Escape from a nested L2 guest to the L1 hypervisor: willsroot.io/2024/08/trojan…
Check out Drakon's corCTF 2024 writeup for his Chromium extension challenge "corctf-challenge-dev" 🕵️ cor.team/posts/corctf-2…
Check out @CaptureTheJam 's forensic challenge writeups from corCTF 2024! cor.team/posts/corctf-2… cor.team/posts/corctf-2…
It's halfway through corCTF 2024! There are still 3 unsolved pwn challenges, 2 unsolved web challenges, and 1 unsolved misc challenge (with many up for 🩸 bounties). Join us at 2024.cor.team !

corCTF 2024 begins in 24 hours 🚨🚨🚨 If you haven't already registered, what are you doing? Go to 2024.cor.team now!!! We have more than 4k USD worth of prizes, and the champion automatically qualifies to DiceCTF Finals 2025 😮